An Adversarial-Driven Experimental Study on Deep Learning for RF Fingerprinting

  • 2025-07-18 17:42:20
  • Xinyu Cao, Bimal Adhikari, Shangqing Zhao, Jingxian Wu, Yanjun Pan
  • 0

Abstract

Radio frequency (RF) fingerprinting, which extracts unique hardwareimperfections of radio devices, has emerged as a promising physical-layerdevice identification mechanism in zero trust architectures and beyond 5Gnetworks. In particular, deep learning (DL) methods have demonstratedstate-of-the-art performance in this domain. However, existing approaches haveprimarily focused on enhancing system robustness against temporal and spatialvariations in wireless environments, while the security vulnerabilities ofthese DL-based approaches have often been overlooked. In this work, wesystematically investigate the security risks of DL-based RF fingerprintingsystems through an adversarial-driven experimental analysis. We observe aconsistent misclassification behavior for DL models under domain shifts, wherea device is frequently misclassified as another specific one. Our analysisbased on extensive real-world experiments demonstrates that this behavior canbe exploited as an effective backdoor to enable external attackers to intrudeinto the system. Furthermore, we show that training DL models on raw receivedsignals causes the models to entangle RF fingerprints with environmental andsignal-pattern features, creating additional attack vectors that cannot bemitigated solely through post-processing security methods such as confidencethresholds.

 

Quick Read (beta)

loading the full paper ...